Cloud CORA

CORA is an acronym: Context Ordered Replacement Algorithm

CORA USB

Your secured data resides in 3-12 files; a data Key and two or more data files.

Depending on your security strategy/profile, you may store some, or all (not recommended) of the CORA files on the USB, Computer, or online. The best choice (besides using Cloud CORA) would be to store some files on the Computer, and some on the USB. Should one or the other become compromised, your data will remain secure.

CORA USB is available as a "thank you" to those who are helping us to build a safer global community, through donations and affiliations. To make a donation, we hope you will visit our project at RocketHub.com

CORA USB is a first generation, standalone solution that allows individuals to securely backup data from one or more personal computers.

Similar to Windows Explorer, users may view files and folders, opting to Lock or Unlock select files and folders as desired.

CORA USB is portable and can be plugged into any computer running Microsoft Windows.

Once locked:

using best practices (meaning don't setup CORA to save all pieces on a single device)

your data cannot be used or viewed

until you unlock it!

Why would I want a CORA USB?

Lock files and/or Folders on your computer. They cannot be used again unless you unlock them!

Most important - with CORA USB your files are safe and secure! If it is lost, no worries - all of the files are needed to recombine your data.
For years I have brought data back and forth with me to work. I have also brought my USB with me on vacations.
The nagging problem that plagued me, even if only as a small thought lurking someone in the deep recesses of my mind,
has always been "what if"... what if I lose it, or someone steals it...

The best is yet to come - Cloud CORA - which will also syncronize with CORA USB when it is available.

The Cloud - servers located online, somewhere out there »

Servers

There are millions of Servers that are interconnected throughout the Internet. There are more Servers located on internal Networks, that also have a connection to the Internet. Computers have more than 65000 ports, which can be thought of as "doors", since these are the ways in which information gets into and/or out of a computer.

Imagine how difficult it would be to lock, monitor and guard 65000 doors in a house, or mall. If someone Signs in as you, on a server, they violate your data. When someone breaches a server, they violate "much more than just one person's data"!
These are the types of breaches that have been gaining more and more visibility through the media, however, there are many more violations that never make it to the news.

I consider myself a creative and imaginative person, and yet, I cannot imagine how it is possible to guarantee that someone will never break into a "home" again. Nor can I imagine that someone will never break into a "server" again.

What does this mean about the safety of our data, and the confidence with which we can comfortably go online to socialize, do our banking, book our trips and hotel rooms, or purchase products?

CORA doesn't endeavor to become a regulated, governed body that is worthy of your trust (including all of its employees).
It is ok if you don't want to trust goCORA.com, CloudCORA.com, and anyone else... completely - just hold onto your data Key and client Key, and optionally one of the data files.

CORA can be unbreakable due to its creative use of Context Ordered Rendering that places indecipherable zeros and ones into different files, that may be stored at different locations.

If one file, or two, or more... are stolen, they will remain useless to the cyber criminal, unless every single file, and key, is obtained

So how could CORA be "broken"?

If an individual user elected to keep all of the files on a single computer, or USB, then should someone steal this computer or USB, they could conceivably have access to the secured data.

For corporations or institutions the only vulnerability would be having someone on the inside who has sufficient permissions to determine where each of these files are located, and then the permission to access them. With proper record keeping and best practices in place, such a criminal would be readily identified and prosecuted. Moreover, such intimate knowledge of the distributed environment should not be entrusted to a single individual.

With CORA, Cloud based data storage will become the most secure style of data storage. The number of files will be astronomical meaning that it becomes impossible for a cyber criminal to know where a particular CORA solution is stored in its entirety. Should a particular file be compromised, the system can quickly shut down access to other networks, server farms, or data points that may contain the remaining files.

Cloud CORA - imagine

each node (dot) represents a server farm

each farm contains hundreds of servers

each server holds millions of data files

the darker the dots, the more servers

What are the chances that someone might guess (or know) where your 2, 3, 4... or more ... data files are?

What are the chances that someone might breach, not just one server, but multiple servers "at the same time"?

Why Encryption isn't enough.

Encryption has an important place in our modern world, but isn't enough for protecting your data.

Encryption has been the standard way of scrambling data so that "unauthorized" individuals cannot have access to the protected data.

Encryption is fundamentally based upon one or more "keys" that can unlock the data; very much like a key is used to unlock your door at home or in your car. We can think of the car door as the encryption that occurs with data sent over the internet... it is meant to be in motion. The door to your home is like the data stored on a server; the recent theft of credit card info at Target is just one of many examples.

Sadly it is a well known fact that someone always finds a way to "break" a lock, even the best and most expensive locks. For decades, smart people have built better and better safes, and yet, someone finds a way to "break open" the safe.

Encryption's keys are fundamentally prime numbers. Building better encryption mostly involves using larger and larger prime numbers. The problem is that computers become more powerful every day, and so, someone can find these "larger prime numbers" - it is just a matter of time.

Another inherent problem with Encryption is that, like a key to your home, it is relatively easy to know when you have the right key.
Have you even tried different keys in the lock, knowing that finally you have found the right key since it fits the lock and turns... unlocking the door.

Encryption is much the same, once the "random key (prime number)" fits, the door can be opened.

A server is like a huge mall, with millions of doors. This is why servers can be breached; how can anyone guarantee
that "a mall which is open to the public" can never be broken into, or "walked into" by a "thief".

If a thief steals a "locked box" of data from a mall, and brings it home, that "single box" will eventually be opened.

Encryption does have an important role, particularly with data being sent over the internet (like your car door). It is fairly difficult to try fitting a whole lot of keys into a car door, when the car door is moving!

Encryption should not be used for "Data security".This is where CORA belongs!

CORA USB desktop is the ideal solution for protecting your data on a standalone device, such as a workstation, personal computer or notebook.